Home

Description

A weakness has been identified in Yealink SIP-T21P E2 52.84.0.15. Impacted is an unknown function of the component Local Directory Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.

PUBLISHED Reserved 2025-12-07 | Published 2025-12-08 | Updated 2025-12-08 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Cross Site Scripting

Code Injection

Product status

52.84.0.15
affected

Timeline

2025-12-07:Advisory disclosed
2025-12-07:VulDB entry created
2025-12-07:VulDB entry last update

Credits

cccll (VulDB User) reporter

References

vuldb.com/?id.334670 (VDB-334670 | Yealink SIP-T21P E2 Local Directory cross site scripting) vdb-entry

vuldb.com/?ctiid.334670 (VDB-334670 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.701949 (Submit #701949 | Yealink T21P_2E 52.84.0.15 Cross Site Scripting) third-party-advisory

drive.google.com/...1AZgnqow1yPrsgsBkw4jXc2/view?usp=sharing exploit

cve.org (CVE-2025-14228)

nvd.nist.gov (CVE-2025-14228)

Download JSON